Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comment
APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT &a
Aaron Barr was en-signals intelligence officer specializing in analytics. As part of HBGary Federal,
On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, e
Could thousands of people keep a secret? Common sense says no—secrets spread, and people talk. But f
Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents,
In 1963, the FDA raided the headquaters of a budding new and esoteric religion - The Church of Scien
On Dec. 5, 2016, two senior Russian Intelligence officers and two civilians were arrested and accuse
SNAP - better known as food stamps - goes back to the Great Depression. ,The physical stamps were re
Nicole Kotsianas, an investigator with K2 Intelligence, made it her personal mission to hunt down th
In 2015, two aspiring script writers flew to Indonesia to meet with executives of a large Chinese fi
In the pre-internet era, encryption was a matter of life and death, and the motives behind these cip
Why did people write malware in the pre-internet days? Back then, there was no way to make money by
Section 230 is the pivotal law that has enabled the rise of social media -while sparking heated deba
In 2016, Joe Sullivan, former CISO of Facebook, was at the peak of his career. As Uber's new CIS
In this episode of ML, we're exploring the history of the well-known Nigerian Prince scam, also
Dive into the world of open-source intelligence (OSINT) in this episode, where we uncover how ordina
A few weeks ago we had a listener’s meetup in New York, and as part of that meetup, I gave a talk in
In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, on
In the 1950s and 60s - even leading into the 1990s - the cost of storage was so high, that using a 2
The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used alongside